Representative work includes developing techniques for preventing side-channel attacks, designing cryptosystems that remain secure even in the event of key compromise, analyzing protocols for key exchange and password-based authentication, exploring cryptographic constructions based on new assumptions, designing techniques for database and location privacy, and developing protocols for secure (“privacy-preserving”) computation over private data.